You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/detections/prebuilt-rules-management.asciidoc
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ Follow these guidelines to start using the {security-app}'s <<prebuilt-rules, pr
16
16
17
17
[NOTE]
18
18
====
19
-
* Prebuilt rules don't start running by default. You must first install the rules, then enable them. After installation, only a few prebuilt rules will be enabled by default, such as the Endpoint Security rule.
19
+
* Most prebuilt rules don't start running by default. You can use the **Install and enable** option to start running rules as you install them, or first install the rules, then enable them manually. After installation, only a few prebuilt rules will be enabled by default, such as the Endpoint Security rule.
20
20
21
21
* You can't modify most settings on Elastic prebuilt rules. You can only edit <<rule-notifications, rule actions>> and <<add-exceptions, add exceptions>>. If you want to modify other settings on a prebuilt rule, you must first duplicate it, then make your changes to the duplicated rule. However, your customized rule is entirely separate from the original prebuilt rule, and will not get updates from Elastic if the prebuilt rule is updated.
TIP: To examine the details of a rule before you install it, select the rule name. This opens the rule details flyout.
40
40
41
41
. Do one of the following:
42
-
* Install all available rules: Click *Install all*.
43
-
* Install a single rule: Click *Install rule* for that rule.
44
-
* Install multiple rules: Select the rules and click *Install _x_ selected rule(s)*.
42
+
+
43
+
--
44
+
* Install all available rules: Click *Install all* at the top of the page. (This doesn't enable the rules; you still need to do that manually.)
45
+
* Install a single rule: In the rules table, either click **Install** to install a rule without enabling it, or click image:images/boxesVertical.svg[Vertical boxes button] → **Install and enable** to start running the rule once it's installed.
46
+
* Install multiple rules: Select the rules, and then at the top of the page either click *Install _x_ selected rule(s)* to install without enabling the rules, or click image:images/boxesVertical.svg[Vertical boxes button] → **Install and enable** to install and start running the rules.
47
+
--
45
48
+
46
49
TIP: Use the search bar and *Tags* filter to find the rules you want to install. For example, filter by `OS: Windows` if your environment only includes Windows endpoints. For more on tag categories, refer to <<prebuilt-rule-tags>>.
. Go back to the *Rules* page, search or filter for any rules you want to run, and do either of the following:
54
+
. For any rules you haven't already enabled, go back to the *Rules* page, search or filter for the rules you want to run, and do either of the following:
52
55
53
56
* Enable a single rule: Turn on the rule's *Enabled* switch.
54
57
* Enable multiple rules: Select the rules, then click *Bulk actions* -> *Enable*.
* Automated response actions require an https://www.elastic.co/pricing[Enterprise subscription].
15
15
* Hosts must have {agent} installed with the {elastic-defend} integration.
16
16
* Your user role must have the ability to create detection rules and the privilege to perform <<response-action-commands,specific response actions>> (for example, the **Host Isolation** privilege to isolate hosts).
17
-
* You can only add automated response actions to <<create-custom-rule,custom query>>, <<create-eql-rule,event correlation (EQL)>>, <<create-new-terms-rule,new terms>>, and <<create-esql-rule,{esql}>> type rules.
18
17
--
19
18
20
19
To add automated response actions to a new or existing rule:
0 commit comments